Beruflich Dokumente
Kultur Dokumente
PROXY SERVER
INTRODUCTION
Some home networks, corporate intranets, and Internet Service Providers (ISPs) use
proxy servers (also known as proxies). Proxy servers act as a "middleman" or broker
between the two ends of a client/server network connection. Proxy servers work with Web
browsers and servers, or other applications, by supporting underlying network protocols
like HTTP.
The proxy technology, which has developed greatly in the last years, offers the perfect
solution for organizations sitting on a closed subnet behind a firewall, who are interested
in giving their employees a controlled access to the Internet.
To maximize employee productivity, organizations need to ensure a high quality Internet
experience for users. In addition, enterprises need to implement content and user policies
to manage Web traffic growth, while effectively using network resources.
Hence the solution for this is a Proxy server. By definition, "proxy" refers to a person or
agency who has authority to act for another. So, taken literally, this means that mean a
"proxy server" acts in place of another server?
A www proxy server is the answer for many companies, who are looking for ways of
minimizing the costs of giving their employees access to the Internet, and yet, increasing
the access control the company has over its accessible web sites. The www proxy server
provides access to the Web for people on closed subnets who can only access the
Internet through a firewall machine.
A proxy server is a kind of buffer between your computer and the Internet resources you
are accessing (Web sites, FTP archives etc.). The data you request come to the proxy
first, and only then it transmits the data to the user.
It is to be taken care that the Internet's growth and success is strongly related to its
"open" nature. An Internet which would have been segmented from the start with firewalls,
packet filters, and proxies may not have become what it is today.
The proxy allows managing the kind of activities that the different users are authorized to
do. It can also give reports of users activity and one very useful thing which is providing
information using smart cache system, therefore making response time shorter, after the
first document fetch.
EXISTING SYSTEM
• The WWW which is very popular can be considered as a large distributed information
system.
• The Internet usage is relatively inexpensive and itsv exponential growth in size.
• Statisc reporst shows that on an average 600-800 millions of static web pages are
launched along with several dynamic web pages which is an enormous increases
• Accessing information is very fast and documents appeal to a wide range of interests
• Network congestion and Server overloading
• Bandwidth is not growing fast enough.
• Without solution WWW will become too congested and its entire appeal would be lost.
SOFTWARE
OPERATING SYSTEM : WIN 2000/WIN XP/WIN 98
SOFTWARE : JDK 1.3 OR HIGHER
WEB SERVER : Tomcat / Web Logic server
DATABASE : Oracle 8i
The bottleneck of the connection between the client and the internet and hence it can be
shared by all clients inside the firewall. There is a feature of access latency. Our system
also implements a firewall for security reasons.
Perhaps the most common form of network firewall is a proxy server. Proxy servers act as
an intermediary between intranet and Internet computers by receiving and selectively
blocking data packets at the network boundary.
These network firewalls also provide an extra measure of safety by hiding internal LAN
addresses from the outside Internet. In a proxy server firewall environment, network
requests from multiple clients appear to the outsider as all coming from the same proxy
server address.
OUR PROPSOED SYSTEM FEATURES
• Popular web pages are stored locally and served from our local server
• Telecommunications traffic to the Internet can be substantially reduced
• Faster web page and FTP response times
• Better utilization of the limited bandwidth
2. Account manager
Permit category
Authentication types
Account configuration
3. Bandwidth management
6. Caching
7. Firewall
8. Reports
Log reports
User usage reports
1. User registration
2. Login management
3. Site access